default search action
Henryk Piech
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c29]Henryk Piech, Grzegorz Grodzki:
Prioritization of Tasks in the Strategy Evaluation Procedure. DepCoS-RELCOMEX 2019: 402-410 - 2018
- [c28]Magdalena Laskowska, Lukasz Laskowski, Jerzy Jelonkiewicz, Henryk Piech, Zbigniew Filutowicz:
Porous Silica-Based Optoelectronic Elements as Interconnection Weights in Molecular Neural Networks. ICAISC (1) 2018: 130-135 - [i1]Grzegorz Grodzki, Henryk Piech:
Strategic analysis of implementation assets and threats. CoRR abs/1805.06052 (2018) - 2017
- [c27]Henryk Piech, Aleksandra Ptak, Michal Saczek:
The Method of Creating Players in the Marketing Strategy. DepCoS-RELCOMEX 2017: 358-367 - [c26]Magdalena Laskowska, Lukasz Laskowski, Jerzy Jelonkiewicz, Henryk Piech, Tomasz Galkowski, Arnaud Boullanger:
Porous Silica Templated Nanomaterials for Artificial Intelligence and IT Technologies. ICAISC (2) 2017: 509-517 - [c25]Henryk Piech, Grzegorz Grodzki:
Audit expert system of communication security assessment. KES 2017: 147-156 - 2016
- [c24]Henryk Piech, Grzegorz Grodzki:
Parallel Real Time Investigation of Communication Security Changes Based on Probabilistic Timed Automata. BIS 2016: 158-168 - [c23]Lukasz Laskowski, Magdalena Laskowska, Jerzy Jelonkiewicz, Henryk Piech, Tomasz Galkowski, Arnaud Boullanger:
The Concept of Molecular Neurons. ICAISC (2) 2016: 494-501 - [c22]Henryk Piech, Lukasz Laskowski, Jerzy Jelonkiewicz, Magdalena Laskowska, Arnaud Boullanger:
Associative Memory Idea in a Nano-Environment. ICAISC (2) 2016: 535-545 - 2015
- [j2]Henryk Piech, Grzegorz Grodzki:
Probability Timed Automata for Investigating Communication Processes. Int. J. Appl. Math. Comput. Sci. 25(2): 403-414 (2015) - [c21]Henryk Piech, Grzegorz Grodzki, Aleksandra Ptak:
The Modeling Algorithm of Communication Run Operations in a Network. DepCoS-RELCOMEX 2015: 341-350 - [c20]Aleksandra Ptak, Henryk Piech, Nina Zhou:
The Setup Method of the Order with the Help of the Rough Sets Convention. ICAISC 2015: 495-503 - 2014
- [c19]Henryk Piech, Aleksandra Ptak, Ali Jannatpour:
Implementing a Supply Chain Management Policy System Based on Rough Set Theory. ICAISC (2) 2014: 548-557 - [c18]Henryk Piech, Grzegorz Grodzki, Piotr Borowik:
Communication Security Prognosis Realized as the Parallel Dynamic Auditing Intelligent System. KES-AMSTA 2014: 139-149 - [c17]Henryk Piech, Grzegorz Grodzki, Aleksandra Ptak:
Parallel simulation of dynamic communication processes on the base of probability time automata. SIMULTECH 2014: 237-242 - 2013
- [c16]Henryk Piech, Grzegorz Grodzki:
The System Conception of Investigation of the Communication Security Level in Networks. BIS (Workshops) 2013: 148-159 - [c15]Henryk Piech, Aleksandra Ptak:
Distribution Network Characteristics in Rough Set Approach. ICAISC (2) 2013: 559-568 - [c14]Miroslaw Kurkowski, Olga Siedlecka-Lamch, Sabina Szymoniak, Henryk Piech:
Parallel Bounded Model Checking of Security Protocols. PPAM (1) 2013: 224-234 - 2012
- [j1]Henryk Piech:
Sequence Automata for Researching Consensus Levels. Trans. Comput. Collect. Intell. 8: 82-101 (2012) - [c13]Olga Siedlecka-Lamch, Miroslaw Kurkowski, Henryk Piech:
A New Effective Approach for Modelling and Verification of Security Protocols. CS&P 2012: 191-202 - [c12]Henryk Piech, Olga Siedlecka-Lamch:
Interval Probabilities of State Transitions in Probabilistic Automata. ICAISC (2) 2012: 688-696 - 2011
- [c11]Henryk Piech:
Sequence Automata for Researching Consensus Levels. KES-AMSTA 2011: 251-260 - [c10]Henryk Piech, Adam Czubak:
The Network Balance Realized by Routing Organization System. KES-AMSTA 2011: 425-435 - [c9]Henryk Piech, Olga Siedlecka-Lamch:
Parallel Quantum Algorithm for Finding the Consistency of Saaty's Matrices. PPAM (1) 2011: 102-111 - 2010
- [c8]Henryk Piech, Urszula Bednarska:
Comparison Judgments in Incomplete Saaty Matrices. ICAISC (2) 2010: 622-629 - [c7]Henryk Piech, Urszula Bednarska:
Iterative Method for Improving Consistency of Multi-attribute Object Judgments Performed by Teams of Decision Makers. KES-AMSTA (2) 2010: 150-159
2000 – 2009
- 2009
- [c6]Henryk Piech:
Dependencies and Configurations of Solutions in Multicriteria Optimization in Nets. CN 2009: 143-150 - [c5]Henryk Piech:
The Graphic Representation of Areas of Rough Sets Characterizing the Groups of Scheduled Tasks. CN 2009: 310-317 - [c4]Henryk Piech:
Analysis of Possibilities and Effectiveness of Combine Rough Sets and Neighborhood Theories for Solving Dynamic Scheduling Problem. DepCoS-RELCOMEX 2009: 296-303 - [c3]Henryk Piech, Urszula Górnik:
The Use of Heuristics in Creating Speculation Strategy. DepCoS-RELCOMEX 2009: 304-312 - 2008
- [c2]Henryk Piech:
Fuzzy strategies in modeling effects of technological implementations. DepCoS-RELCOMEX 2008: 23-30 - [c1]Henryk Piech, Pawel Figat:
A Method for Evaluation of Compromise in Multiple Criteria Problems. ICAISC 2008: 1099-1108 - 2006
- [p2]Henryk Piech, Aleksandra Ptak, Marcin Machura:
Interchangeable Strategies in Games without Side Payments on the Base of Uncertain Information on Resources. Biometrics, Computer Security Systems and Artificial Intelligence Applications 2006: 269-278 - 2005
- [p1]Henryk Piech, Aleksandra Ptak, Marcin Machura:
Evaluation of operation and state of an object using artificial intelligence tools. Information Processing and Security Systems 2005: 465-475
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint